首页 > 最新文献

2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)最新文献

英文 中文
Scalable Block Execution via Parallel Validation 通过并行验证可扩展块执行
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169400
Maya Leshkowitz, Olivia Benattasse, O. Wertheim, Ori Rottenstreich
A dominant part in blockchain networks is reaching an agreement on block transactions and their impact on the network state. We follow a common scenario where a node is selected to propose a block and its implied state updates. The proposal is then validated by other nodes that examine the block impact on the state. Typically, all validators execute the complete block and provide an indication based on comparing the results of their execution to the updated state in the proposal. With the increase in the number of participants in blockchain networks, we suggest a time-efficient block validation through splitting it into multiple disjoint tasks. This can be challenging due to possible dependencies between the block transactions. We describe the additional information the leader has to provide to enable that. Moreover, we describe a unique proof for the block partition computed by the leader such that when validated in part by the different committees guarantees the correctness of the execution by the leader. We compare the approach to traditional solutions based on real data of the Ethereum blockchain.
区块链网络的一个主要部分是就区块交易及其对网络状态的影响达成协议。我们遵循一个常见的场景,即选择一个节点来提出一个块及其隐含的状态更新。然后,该提案由其他节点验证,这些节点检查区块对状态的影响。通常,所有验证器都执行完整的块,并根据执行结果与提案中的更新状态进行比较,提供指示。随着区块链网络参与者数量的增加,我们建议通过将区块分割成多个互不关联的任务来进行高效的区块验证。由于块事务之间可能存在依赖关系,这可能具有挑战性。我们描述了领导者必须提供的额外信息以实现这一目标。此外,我们描述了由领导者计算的块分区的唯一证明,当由不同的委员会部分验证时,保证领导者执行的正确性。我们将该方法与基于以太坊区块链真实数据的传统解决方案进行了比较。
{"title":"Scalable Block Execution via Parallel Validation","authors":"Maya Leshkowitz, Olivia Benattasse, O. Wertheim, Ori Rottenstreich","doi":"10.1109/ICBC48266.2020.9169400","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169400","url":null,"abstract":"A dominant part in blockchain networks is reaching an agreement on block transactions and their impact on the network state. We follow a common scenario where a node is selected to propose a block and its implied state updates. The proposal is then validated by other nodes that examine the block impact on the state. Typically, all validators execute the complete block and provide an indication based on comparing the results of their execution to the updated state in the proposal. With the increase in the number of participants in blockchain networks, we suggest a time-efficient block validation through splitting it into multiple disjoint tasks. This can be challenging due to possible dependencies between the block transactions. We describe the additional information the leader has to provide to enable that. Moreover, we describe a unique proof for the block partition computed by the leader such that when validated in part by the different committees guarantees the correctness of the execution by the leader. We compare the approach to traditional solutions based on real data of the Ethereum blockchain.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122341538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Distributed Consensus for Mobile Devices using Online Brokers 使用在线代理的移动设备的分布式共识
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169447
Mehrdad Kiamari, B. Krishnamachari, Muhammad Naveed, Seokgu Yun
We present a Byzantine Fault Tolerant (BFT) distributed ledger protocol that is aimed at making mobile devices first-class citizens in the consensus process by having them communicate through online brokers. The protocol is provably safe and live. We show that it is capable of a throughput on the order of several thousand transactions per second per shard, and sub-second confirmation latency.
我们提出了一种拜占庭容错(BFT)分布式账本协议,旨在通过让移动设备通过在线代理进行通信,使其成为共识过程中的一等公民。协议可以证明是安全有效的。我们展示了它能够在每个分片每秒几千个事务的吞吐量,以及亚秒级的确认延迟。
{"title":"Distributed Consensus for Mobile Devices using Online Brokers","authors":"Mehrdad Kiamari, B. Krishnamachari, Muhammad Naveed, Seokgu Yun","doi":"10.1109/ICBC48266.2020.9169447","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169447","url":null,"abstract":"We present a Byzantine Fault Tolerant (BFT) distributed ledger protocol that is aimed at making mobile devices first-class citizens in the consensus process by having them communicate through online brokers. The protocol is provably safe and live. We show that it is capable of a throughput on the order of several thousand transactions per second per shard, and sub-second confirmation latency.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"17 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128633646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parallel Hash-Mark-Set on the Ethereum Blockchain 以太坊区块链上的并行哈希标记集
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169415
Zachary Painter, Pradeep Kumar Gayam, Victor Cook, D. Dechev
Popular blockchains such as Bitcoin or Ethereum provide a transaction isolation level of READ-COMMITTED. This provides difficulties when state changes many times per block interval. Hash-Mark-Set (HMS) alleviates this problem by enabling READ-UNCOMMITTED transactions for state variables. However, the current HMS implementation relies on a sequential algorithm and is susceptible to redundant calculations. As modern processors rely more heavily on parallel algorithms to leverage multiple cores for speedup, sequential algorithms see less benefit from hardware improvements. This paper proposes a lock-free HMS to make use of thread-safe techniques and other optimizations to improve the performance of the HMS algorithm and reduce the latency of read-uncommitted state variable accesses. In our experiments, the proposed algorithm experiences an average 6.4x increase in performance up to 128 go-routines, and a maximum 11.1x increase.
比特币或以太坊等流行的区块链提供了READ-COMMITTED的事务隔离级别。当状态在每个块间隔内更改多次时,这会带来困难。哈希标记集(HMS)通过为状态变量启用READ-UNCOMMITTED事务缓解了这个问题。然而,当前的HMS实现依赖于顺序算法,容易受到冗余计算的影响。由于现代处理器更多地依赖于并行算法来利用多核加速,因此串行算法从硬件改进中获得的好处较少。本文提出了一种无锁的HMS,利用线程安全技术和其他优化来提高HMS算法的性能,减少读取未提交状态变量访问的延迟。在我们的实验中,提出的算法在128个go-routine中平均提高了6.4倍的性能,最大提高了11.1倍。
{"title":"Parallel Hash-Mark-Set on the Ethereum Blockchain","authors":"Zachary Painter, Pradeep Kumar Gayam, Victor Cook, D. Dechev","doi":"10.1109/ICBC48266.2020.9169415","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169415","url":null,"abstract":"Popular blockchains such as Bitcoin or Ethereum provide a transaction isolation level of READ-COMMITTED. This provides difficulties when state changes many times per block interval. Hash-Mark-Set (HMS) alleviates this problem by enabling READ-UNCOMMITTED transactions for state variables. However, the current HMS implementation relies on a sequential algorithm and is susceptible to redundant calculations. As modern processors rely more heavily on parallel algorithms to leverage multiple cores for speedup, sequential algorithms see less benefit from hardware improvements. This paper proposes a lock-free HMS to make use of thread-safe techniques and other optimizations to improve the performance of the HMS algorithm and reduce the latency of read-uncommitted state variable accesses. In our experiments, the proposed algorithm experiences an average 6.4x increase in performance up to 128 go-routines, and a maximum 11.1x increase.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"388 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125413230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
From Hodl to Heist: Analysis of Cyber Security Threats to Bitcoin Exchanges 从Hodl到抢劫:比特币交易所的网络安全威胁分析
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169412
Kris Oosthoek, C. Doerr
Bitcoin is gaining traction as an alternative store of value. Its market capitalization transcends all other cryptocurrencies in the market. But its high monetary value also makes it an attractive target to cyber criminal actors. Hacking campaigns usually target the weakest points in an ecosystem. In Bitcoin, these are currently the exchange platforms. As each exchange breach potentially decreases Bitcoin’s market value by billions, it is a threat not only to direct victims, but to everyone owning Bitcoin. Based on an extensive analysis of 36 breaches of Bitcoin exchanges, we show the attack patterns used to exploit Bitcoin exchange platforms using an industry standard for reporting intelligence on cyber security breaches. Based on this we are able to provide an overview of the most common attack vectors, showing that all except three hacks were possible due to relatively lax security. We also show that while the security regimen of Bitcoin exchanges is not on par with other financial service providers, the use of stolen credentials, which does not require any hacking, is decreasing. We also show that the amount of BTC taken during a breach is decreasing, as well as the exchanges that terminate after being breached. With exchanges being targeted by nation-state hacking groups, security needs to be a first concern.
比特币作为另一种价值储存手段正获得越来越多的关注。其市值超过了市场上所有其他加密货币。但它的高货币价值也使它成为网络犯罪分子的一个有吸引力的目标。黑客活动通常针对生态系统中最薄弱的环节。在比特币中,这些是目前的交易平台。由于每次交易所漏洞都可能使比特币的市值减少数十亿美元,这不仅是对直接受害者的威胁,也是对所有比特币持有者的威胁。基于对36起比特币交易漏洞的广泛分析,我们使用行业标准报告网络安全漏洞情报,展示了用于利用比特币交易平台的攻击模式。在此基础上,我们能够提供最常见攻击向量的概述,显示除了三个攻击之外,由于相对宽松的安全性,所有攻击都是可能的。我们还表明,虽然比特币交易所的安全制度与其他金融服务提供商不一样,但不需要任何黑客攻击的被盗凭证的使用正在减少。我们还显示,在被攻破期间被窃取的比特币数量正在减少,被攻破后终止的交易所也在减少。随着交易所成为民族国家黑客组织的目标,安全需要成为首要考虑的问题。
{"title":"From Hodl to Heist: Analysis of Cyber Security Threats to Bitcoin Exchanges","authors":"Kris Oosthoek, C. Doerr","doi":"10.1109/ICBC48266.2020.9169412","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169412","url":null,"abstract":"Bitcoin is gaining traction as an alternative store of value. Its market capitalization transcends all other cryptocurrencies in the market. But its high monetary value also makes it an attractive target to cyber criminal actors. Hacking campaigns usually target the weakest points in an ecosystem. In Bitcoin, these are currently the exchange platforms. As each exchange breach potentially decreases Bitcoin’s market value by billions, it is a threat not only to direct victims, but to everyone owning Bitcoin. Based on an extensive analysis of 36 breaches of Bitcoin exchanges, we show the attack patterns used to exploit Bitcoin exchange platforms using an industry standard for reporting intelligence on cyber security breaches. Based on this we are able to provide an overview of the most common attack vectors, showing that all except three hacks were possible due to relatively lax security. We also show that while the security regimen of Bitcoin exchanges is not on par with other financial service providers, the use of stolen credentials, which does not require any hacking, is decreasing. We also show that the amount of BTC taken during a breach is decreasing, as well as the exchanges that terminate after being breached. With exchanges being targeted by nation-state hacking groups, security needs to be a first concern.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"24 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124469548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Rational Exchange: Incentives in Atomic Cross Chain Swaps 理性交换:原子交叉链交换的激励
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169408
Janick Rueegger, Guilherme Sperb Machado
Protocols based on Hash Time Lock Contracts (HTLCs) show tremendous potential to enable a truly decentralized exchange of digital currencies. In contrast to traditional financial systems and centralized crypto-exchanges, HTLC protocols provide a method to trade crypto-currencies in a peer-to-peer manner. However, considering the elimination of a third-party authority, remarkable price fluctuations and the protocol’s extensive time-to-completion, involved parties might be incentivized to deviate from the protocol and cancel a trade midway. Thus, this paper analyzes the protocol’s incentive structure based on a model of rationality to further quantify its impact on potential trades, using historical exchange rates. By analyzing different crypto-currency trading pairs, this paper highlights the probabilistic nature of a typical HTLC protocol. The results show that although the protocol does not offer a guarantee for a successful trade, it is applicable in scenarios of exchange-rates with low drift, low volatility, and an optimized time-to-completion.
基于哈希时间锁定合约(htlc)的协议显示出巨大的潜力,可以实现真正去中心化的数字货币交换。与传统的金融系统和集中式加密交易不同,HTLC协议提供了一种以点对点方式交易加密货币的方法。然而,考虑到第三方权威机构的消除、价格的显著波动以及协议的漫长完成时间,相关各方可能会受到激励而偏离协议,并在中途取消交易。因此,本文基于理性模型分析协议的激励结构,利用历史汇率进一步量化其对潜在交易的影响。通过分析不同的加密货币交易对,本文强调了典型HTLC协议的概率性质。结果表明,虽然该协议不能保证交易成功,但它适用于低漂移、低波动和优化完成时间的汇率场景。
{"title":"Rational Exchange: Incentives in Atomic Cross Chain Swaps","authors":"Janick Rueegger, Guilherme Sperb Machado","doi":"10.1109/ICBC48266.2020.9169408","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169408","url":null,"abstract":"Protocols based on Hash Time Lock Contracts (HTLCs) show tremendous potential to enable a truly decentralized exchange of digital currencies. In contrast to traditional financial systems and centralized crypto-exchanges, HTLC protocols provide a method to trade crypto-currencies in a peer-to-peer manner. However, considering the elimination of a third-party authority, remarkable price fluctuations and the protocol’s extensive time-to-completion, involved parties might be incentivized to deviate from the protocol and cancel a trade midway. Thus, this paper analyzes the protocol’s incentive structure based on a model of rationality to further quantify its impact on potential trades, using historical exchange rates. By analyzing different crypto-currency trading pairs, this paper highlights the probabilistic nature of a typical HTLC protocol. The results show that although the protocol does not offer a guarantee for a successful trade, it is applicable in scenarios of exchange-rates with low drift, low volatility, and an optimized time-to-completion.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122780424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Right-of-Stake: Deterministic and Fair Blockchain Leader Election with Hidden Leader 股权:具有隐藏领导者的确定性公平bb0领导者选举
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169422
Teik Guan Tan, Vishal Sharma, Jianying Zhou
Mainstream applications typically require a trusted authority where application clients will connect to obtain a service. In the blockchain decentralized environment, this trusted authority or the leader changes frequently and is selected randomly depending on the protocol. Such procedures may take an unacceptable amount of time or resources to establish the leader causing overheads, latency or processing issues if mainstream applications are to adopt the blockchain. Focusing on these issues, we present Right-of-Stake (RoS), a novel approach in a synchronous blockchain network to deterministically elect a leader or block proposer out of a group of participants, each with different stakes. This procedure is completed in a guaranteed equitable manner while removing the need for Proof-of-Work’s (PoW) aggressive-resource computations or Proof-of-Stake’s (PoS) inter-node negotiations. Besides, through the use of zero-knowledge range proofs, RoS has a distinct advantage of being able to hide the identity of future leaders until the point when the leader surfaces to propose the block. We also simulate RoS and show that it can recover from Denial-of-Service attacks which have been a point of contention in arguments against deterministic leader election protocols. We view RoS as a possible consensus replacement for blockchains that require an improved leader election process when deployed for mainstream applications.
主流应用程序通常需要一个可信的权威机构,应用程序客户端将连接到该机构以获取服务。在区块链去中心化环境中,这种受信任的权威或领导者经常变化,并根据协议随机选择。如果主流应用程序要采用区块链,这些程序可能需要花费不可接受的时间或资源来建立领导者,从而导致开销、延迟或处理问题。针对这些问题,我们提出了权益(RoS),这是同步区块链网络中的一种新方法,可以从一组参与者中确定性地选出领导者或区块提议者,每个参与者都有不同的权益。该过程以保证公平的方式完成,同时消除了工作量证明(PoW)激进资源计算或PoS节点间协商的需要。此外,通过使用零知识范围证明,RoS具有明显的优势,可以隐藏未来领导者的身份,直到领导者浮出水面提出区块。我们还模拟了RoS,并表明它可以从拒绝服务攻击中恢复,拒绝服务攻击一直是反对确定性领导人选举协议的争论点。我们认为RoS是区块链的一种可能的共识替代品,当部署到主流应用程序时,区块链需要改进的领导者选举过程。
{"title":"Right-of-Stake: Deterministic and Fair Blockchain Leader Election with Hidden Leader","authors":"Teik Guan Tan, Vishal Sharma, Jianying Zhou","doi":"10.1109/ICBC48266.2020.9169422","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169422","url":null,"abstract":"Mainstream applications typically require a trusted authority where application clients will connect to obtain a service. In the blockchain decentralized environment, this trusted authority or the leader changes frequently and is selected randomly depending on the protocol. Such procedures may take an unacceptable amount of time or resources to establish the leader causing overheads, latency or processing issues if mainstream applications are to adopt the blockchain. Focusing on these issues, we present Right-of-Stake (RoS), a novel approach in a synchronous blockchain network to deterministically elect a leader or block proposer out of a group of participants, each with different stakes. This procedure is completed in a guaranteed equitable manner while removing the need for Proof-of-Work’s (PoW) aggressive-resource computations or Proof-of-Stake’s (PoS) inter-node negotiations. Besides, through the use of zero-knowledge range proofs, RoS has a distinct advantage of being able to hide the identity of future leaders until the point when the leader surfaces to propose the block. We also simulate RoS and show that it can recover from Denial-of-Service attacks which have been a point of contention in arguments against deterministic leader election protocols. We view RoS as a possible consensus replacement for blockchains that require an improved leader election process when deployed for mainstream applications.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124954761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Monetization using Blockchains for IoT Data Marketplace 将区块链用于物联网数据市场的货币化
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169424
Wiem Badreddine, Kaiwen Zhang, C. Talhi
The number of Internet of Things devices is growing dramatically, generating a huge amount of data which is becoming a valuable asset for data analysts. This trend culminates towards the creation of an IoT data marketplace, where streams of data from heterogeneous sources are sent in real time to various data consumers and are metered for monetization purposes. Publish/subscribe systems, such as Message Queuing Telemetry Transport (MQTT), are a promising solution to act as a transport layer for real-time data streams in a decoupled and large scale manner. However, pub/sub systems lack two key properties for an IoT data marketplace: (1) it does not provide any monetization logic; (2) it assumes that the pub/sub brokers are trusted entities, which is not the case in a decentralized or federated marketplace setting. In this paper, we address these issues using a reliable and transparent monetization system based on Distributed Ledger Technology (DLT) and smart contracts. We propose three monetization solutions and demonstrate the trade-off between the overhead of tracking IoT data on a blockchain vs. the accuracy of the monetization for data producers and consumers. In particular, we provide a Bloom filter-based solution for efficient verification of data exchange. We implement our system using Ethereum and Solidity and evaluate with respect to contract gas cost.
物联网设备的数量正在急剧增长,产生了大量的数据,这些数据正在成为数据分析师的宝贵资产。这一趋势最终导致了物联网数据市场的创建,在这个市场中,来自异构来源的数据流被实时发送给各种数据消费者,并为货币化目的进行计量。发布/订阅系统,如消息队列遥测传输(MQTT),是一种很有前途的解决方案,可以以解耦和大规模的方式充当实时数据流的传输层。然而,发布/订阅系统缺乏物联网数据市场的两个关键属性:(1)它不提供任何货币化逻辑;(2)它假设pub/sub代理是受信任的实体,而在分散或联合的市场环境中并非如此。在本文中,我们使用基于分布式账本技术(DLT)和智能合约的可靠透明货币化系统来解决这些问题。我们提出了三种货币化解决方案,并展示了在区块链上跟踪物联网数据的开销与数据生产者和消费者货币化的准确性之间的权衡。特别是,我们提供了一个基于Bloom过滤器的解决方案,用于有效验证数据交换。我们使用以太坊和Solidity来实现我们的系统,并对合同gas成本进行评估。
{"title":"Monetization using Blockchains for IoT Data Marketplace","authors":"Wiem Badreddine, Kaiwen Zhang, C. Talhi","doi":"10.1109/ICBC48266.2020.9169424","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169424","url":null,"abstract":"The number of Internet of Things devices is growing dramatically, generating a huge amount of data which is becoming a valuable asset for data analysts. This trend culminates towards the creation of an IoT data marketplace, where streams of data from heterogeneous sources are sent in real time to various data consumers and are metered for monetization purposes. Publish/subscribe systems, such as Message Queuing Telemetry Transport (MQTT), are a promising solution to act as a transport layer for real-time data streams in a decoupled and large scale manner. However, pub/sub systems lack two key properties for an IoT data marketplace: (1) it does not provide any monetization logic; (2) it assumes that the pub/sub brokers are trusted entities, which is not the case in a decentralized or federated marketplace setting. In this paper, we address these issues using a reliable and transparent monetization system based on Distributed Ledger Technology (DLT) and smart contracts. We propose three monetization solutions and demonstrate the trade-off between the overhead of tracking IoT data on a blockchain vs. the accuracy of the monetization for data producers and consumers. In particular, we provide a Bloom filter-based solution for efficient verification of data exchange. We implement our system using Ethereum and Solidity and evaluate with respect to contract gas cost.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"94 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120908540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Cross-chain Transactions 过渡链交易
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169477
Narges Shadab, F. Houshmand, M. Lesani
The value of cryptocurrencies is highly volatile and investors require fast and reliable exchange systems. In cross-chain transactions, multiple parties exchange assets across multiple blockchains which can be represented as a directed graph ${mathcal{G}}$ with vertexes V as parties and edges E as asset transfers. In a simple form, cross-chain transactions are cross-chain swaps where each edge e transfers an asset that the head of e already owns. However, in general, a cross-chain transaction includes a sequence of exchanges at each blockchain. Further, transactions may have off-chain steps and hence may not be strongly connected. Given a transaction, protocols are desired that guarantee the following property called uniformity. If all parties conform to the protocol, all the assets should be transferred. Further, if any party deviates from the protocol, the conforming parties should not experience any loss. Previous work introduced a uniform protocol for strongly connected cross-chain swaps and showed that no uniform protocol exists for transactions that are not strongly connected. We present a uniform protocol for general cross-chain transactions with sequenced and off-chain steps when a few certain parties are conforming. Further, we prove a new property called end-to-end that guarantees that if the source parties pay, the sink parties are paid. We present a synthesis tool called XCHAIN that given a high-level description of a cross-transaction can automatically generate smart contracts in Solidity for all the parties.
加密货币的价值波动很大,投资者需要快速可靠的交易系统。在跨链交易中,多方在多个区块链上交换资产,这些区块链可以表示为一个有向图${mathcal{G}}$,其中顶点V为各方,边E为资产转移。在一个简单的形式中,跨链交易是跨链交换,其中每个边e转移一个已经拥有的资产。然而,一般来说,跨链交易包括每个区块链的一系列交换。此外,事务可能具有链下步骤,因此可能不是强连接的。给定一个事务,需要协议保证以下称为一致性的属性。如果各方都遵守协议,所有的资产都应该被转移。此外,如果任何一方违反协议,符合协议的一方不应遭受任何损失。先前的工作为强连接的跨链交换引入了统一协议,并表明对于非强连接的交易不存在统一协议。我们提出了一种统一的跨链交易协议,当某些特定方符合时,具有顺序和脱链步骤。此外,我们证明了一个称为端到端的新属性,它保证如果源方支付,则接收方也会支付。我们提出了一个名为XCHAIN的综合工具,它给出了交叉交易的高级描述,可以自动为所有各方在Solidity中生成智能合约。
{"title":"Cross-chain Transactions","authors":"Narges Shadab, F. Houshmand, M. Lesani","doi":"10.1109/ICBC48266.2020.9169477","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169477","url":null,"abstract":"The value of cryptocurrencies is highly volatile and investors require fast and reliable exchange systems. In cross-chain transactions, multiple parties exchange assets across multiple blockchains which can be represented as a directed graph ${mathcal{G}}$ with vertexes V as parties and edges E as asset transfers. In a simple form, cross-chain transactions are cross-chain swaps where each edge e transfers an asset that the head of e already owns. However, in general, a cross-chain transaction includes a sequence of exchanges at each blockchain. Further, transactions may have off-chain steps and hence may not be strongly connected. Given a transaction, protocols are desired that guarantee the following property called uniformity. If all parties conform to the protocol, all the assets should be transferred. Further, if any party deviates from the protocol, the conforming parties should not experience any loss. Previous work introduced a uniform protocol for strongly connected cross-chain swaps and showed that no uniform protocol exists for transactions that are not strongly connected. We present a uniform protocol for general cross-chain transactions with sequenced and off-chain steps when a few certain parties are conforming. Further, we prove a new property called end-to-end that guarantees that if the source parties pay, the sink parties are paid. We present a synthesis tool called XCHAIN that given a high-level description of a cross-transaction can automatically generate smart contracts in Solidity for all the parties.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115004306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Liveness and Consistency of Bitcoin and Prism Blockchains: The Non-lockstep Synchronous Case 比特币和棱镜区块链的活力和一致性:非同步同步案例
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169464
Jing Li, Dongning Guo
Bitcoin is a peer-to-peer payment system proposed by Nakamoto in 2008. Since then, a number of protocols based on the Nakamoto consensus have been proposed to improve the blockchain throughput while maintaining a similar level of security. In addition to bitcoin, this work also studies the Prism protocol proposed by Bagaria, Kannan, Tse, Fanti, and Viswanath in 2018. The liveness and consistency properties of the bitcoin and the Prism backbone protocols have been established by assuming either explicitly or implicitly that the blockchains have finite lifespan. While the lifespan can be arbitrarily large, it is unsatisfying for the security guarantee to be dependent on this parameter. In addition, most analyses also assume lockstep synchrony, where by the end of each round all honest miners have complete information about all blocks published until then. This paper presents a streamlined and strengthened analysis of the liveness and consistency of bitcoin and Prism protocols without the finite lifespan assumption. Also, we use the non-lockstep synchronous model which assumes the block propagation delays to be heterogeneous, arbitrary, and upper bounded by some constant. A probabilistic guarantee is also provided for a transaction to become permanent in the final ledger of all honest miners. In lieu of order optimal results, these properties take the form of explicit bounds, which provide improved design references for public transaction ledger protocols.
比特币是中本聪在2008年提出的一种点对点支付系统。从那时起,人们提出了一些基于中本共识的协议,以提高区块链的吞吐量,同时保持类似的安全水平。除了比特币,这项工作还研究了由Bagaria, Kannan, Tse, Fanti和Viswanath在2018年提出的Prism协议。比特币和Prism骨干协议的活跃性和一致性是通过明确或隐含地假设区块链具有有限的生命周期来建立的。虽然生命周期可以任意大,但依赖于此参数的安全保证是不令人满意的。此外,大多数分析还假设同步,即在每轮结束时,所有诚实的矿工都有关于发布的所有区块的完整信息。本文在没有有限寿命假设的情况下,对比特币和Prism协议的活动性和一致性进行了简化和强化的分析。此外,我们使用了非锁步同步模型,该模型假定块传播延迟是异构的、任意的,并且上界是某个常数。也为交易在所有诚实矿工的最终分类账中永久保存提供了概率保证。这些属性采用显式边界的形式代替了顺序最优结果,这为公共事务分类账协议提供了改进的设计参考。
{"title":"Liveness and Consistency of Bitcoin and Prism Blockchains: The Non-lockstep Synchronous Case","authors":"Jing Li, Dongning Guo","doi":"10.1109/ICBC48266.2020.9169464","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169464","url":null,"abstract":"Bitcoin is a peer-to-peer payment system proposed by Nakamoto in 2008. Since then, a number of protocols based on the Nakamoto consensus have been proposed to improve the blockchain throughput while maintaining a similar level of security. In addition to bitcoin, this work also studies the Prism protocol proposed by Bagaria, Kannan, Tse, Fanti, and Viswanath in 2018. The liveness and consistency properties of the bitcoin and the Prism backbone protocols have been established by assuming either explicitly or implicitly that the blockchains have finite lifespan. While the lifespan can be arbitrarily large, it is unsatisfying for the security guarantee to be dependent on this parameter. In addition, most analyses also assume lockstep synchrony, where by the end of each round all honest miners have complete information about all blocks published until then. This paper presents a streamlined and strengthened analysis of the liveness and consistency of bitcoin and Prism protocols without the finite lifespan assumption. Also, we use the non-lockstep synchronous model which assumes the block propagation delays to be heterogeneous, arbitrary, and upper bounded by some constant. A probabilistic guarantee is also provided for a transaction to become permanent in the final ledger of all honest miners. In lieu of order optimal results, these properties take the form of explicit bounds, which provide improved design references for public transaction ledger protocols.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130013764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Evaluation of Security and Performance of Master Node Protocol in the Bitcoin Peer-to-Peer Network 比特币点对点网络中主节点协议的安全性与性能评价
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169393
M. Sallal, Gareth Owenson, M. Adda
The mechanism of peers randomly choosing logical neighbors without any knowledge about underlying physical topology can cause a delay overhead in information propagation which makes the system vulnerable to double spend attacks. This paper introduces a proximity-aware extensions to the current Bitcoin protocol, named Master Node Based Clustering (MNBC). The ultimate purpose of the proposed protocol is to improve the information propagation delay in the Bitcoin network.
对等体在不了解底层物理拓扑的情况下随机选择逻辑邻居的机制会导致信息传播的延迟开销,使系统容易受到双花攻击。本文介绍了当前比特币协议的邻近感知扩展,称为基于主节点的聚类(MNBC)。该协议的最终目的是改善比特币网络中的信息传播延迟。
{"title":"Evaluation of Security and Performance of Master Node Protocol in the Bitcoin Peer-to-Peer Network","authors":"M. Sallal, Gareth Owenson, M. Adda","doi":"10.1109/ICBC48266.2020.9169393","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169393","url":null,"abstract":"The mechanism of peers randomly choosing logical neighbors without any knowledge about underlying physical topology can cause a delay overhead in information propagation which makes the system vulnerable to double spend attacks. This paper introduces a proximity-aware extensions to the current Bitcoin protocol, named Master Node Based Clustering (MNBC). The ultimate purpose of the proposed protocol is to improve the information propagation delay in the Bitcoin network.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"11 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114045999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1